hwvs / Invoke-GPTObfuscation
Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to obfuscate your PowerShell penetration testing code, malware, or any other sensitive script.
☆49Updated last year
Alternatives and similar repositories for Invoke-GPTObfuscation:
Users that are interested in Invoke-GPTObfuscation are comparing it to the libraries listed below
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆81Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- A collection of PoCs for different injection techniques on Windows!☆43Updated last year
- malleable profile generator GUI for Havoc☆56Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Situational Awareness script to identify how and where to run implants☆44Updated 3 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 3 months ago
- ☆48Updated last year
- ECC Public Key Cryptography☆36Updated last year
- ☆38Updated last year
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆77Updated 9 months ago
- A PoC for achieving persistence via push notifications on Windows☆46Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆46Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago
- Reasonably undetected shellcode stager and executer.☆35Updated 5 months ago
- Docker container for running CobaltStrike 4.10☆36Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 8 months ago
- A command and control framework.☆48Updated 2 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- Lifetime AMSI bypass.☆35Updated 8 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆81Updated 4 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆104Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- ☆53Updated 4 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆111Updated last year
- A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally …☆84Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago